Search Results: 791 vacancies
...improvement measures that help in the security posture of the organization by... ...access to data or systems
# Conduct security assessments... ...requirements. Demonstrates (in parts) frequently with minimal support... ...1.
Customer centricity
Timely security breach solutioning to...
...Fortigate , ISE/ASA and other Security Components
enforce security... ...sensitive data.
Secure network systems by defining access control... ...cyber security issues and provide timely support and future... ...requirements. Demonstrates (in parts) frequently with minimal support...
...We are looking for a dedicated and experienced Security Supervisor to join our team in Jubail, Saudi Arabia. The ideal candidate will... ...technologies and trends.
# Manage and maintain security equipment and systems.
# Assist in the recruitment and selection of security...
...Monitoring and safeguarding the log sources and security access
# Planning for disaster recovery... ...or unacceptable access to data or systems
# Conduct security assessments, risk analysis... ...Measure
1.
Customer centricity
Timely security breach solutioning to end users,...
...An exciting opportunity is available for Sr Specialist I, OT System Admin, Located in Jubail, KSA
POSITION SUMMARY:
To support... ...the Operational Technology Infrastructure & implement cyber security controls to assure safe and reliable operations.
KEY TASKS...
...operational risks, increasing revenue and optimizing cost across all sites worldwide, through:
Expertise deployment for Safety Systems and Functional Safety solutions & improvements
Development and deployment of world class practices and functional expertise
Identifying...
...Recognized cybersecurity certifications such as CISSP, CEH, CompTIA Security+ are preferred.
Experience: Practical experience in the field... ...of information security concepts, networks, operating systems, malware, hacking techniques and how to prevent them.
Analysis...
...Hold a bachelor's degree in architecture or a related field.
Deep knowledge of architectural and security systems design concepts and their applications in different environments.
Deep understanding of cybersecurity concepts and best practices for protecting systems...
...in a related field such as computer science, computer engineering, or information security.
Extensive knowledge of IT security concepts and the various techniques used to protect systems and data.
A deep understanding of potential information security threats and...
...certifications in various disciplines of information systems operation may be preferred.
Technical... ...systems, databases, and information security. These skills may include operating and... ...: The ability to manage priorities and time effectively, and handle requests and...
...Ability to work variable times and under varying conditions, including... ...effectively.
Compliance with laws and regulations related to security and safety.
Ability to use specialized security devices and technology, such as surveillance cameras and alarm systems....
...school diploma, preferably a graduate certificate in the field of security.
Knowledge of security procedures and techniques used in maintaining security and safety.
Ability to use surveillance systems and security technology, such as surveillance cameras and fire...
...qualifications:
Bachelor's degree in computer science, information security, computer engineering, or related field.
Recognized... ...as CEH (Certified Ethical Hacker), CISSP (Certified Information Systems Security Professional), or CompTIA Security+.
Practical experience...
...On Bonus of $5,000 for Solo Drivers
$2,000 to each driver after completion of first dispatch
$3,000 to each driver at 60 days
Alpha Freight Systems
Class A CDL 12 Months Recent Tractor Trailer Truck Driving Experience Clean Driving Record Clean Background
...APQ INSTRUMENT \U0026AMP; CONTROL SYSTEMS ENGINEER
COMPANY PROFILE
Air Products Qudra is a regional development and investment joint venture (JV) between Air Products and Qudra Energy, a subsidiary of Vision Invest. Air Products is a world-leading industrial gases...
...knowledge of code versioning tools [such as Git, Bitbucket or SVN ] is a plus
Working knowledge of/on different Operating Systems like Linux, Unix, Windows
Experience/Knowledge in creating tables, partitioning, bucketing, loading, and aggregating data using...
...Minimum high school diploma; A university degree or professional training in security or business administration is preferred.
Strong knowledge of security concepts and principles, including preventative measures and emergency management.
Ability to analyze risks...
...Bachelor's degree in Computer Science or related field, advanced certifications in information security such as CISSP, CISM, or CEH preferred.
Extensive IT security experience with a deep understanding of threats, vulnerabilities and defensive techniques.
In-depth...
...Hold a bachelor's degree in computer engineering, electrical engineering, or a related field.
Deep knowledge of information systems concepts and embedded design.
Advanced understanding of embedded systems and extensive knowledge of electronic systems components and...
...a related field such as information technology, cybersecurity, security management, or a related field.
Deep knowledge of cybersecurity... ...field of security.
A comprehensive understanding of network systems and technology used in cybersecurity.
Ability to analyze...